Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0732: Command Injection in D-Link DI-8200G

0
Medium
VulnerabilityCVE-2026-0732cvecve-2026-0732
Published: Thu Jan 08 2026 (01/08/2026, 23:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-8200G

Description

CVE-2026-0732 is a medium severity command injection vulnerability affecting the D-Link DI-8200G router firmware version 17. 12. 20A1. The flaw exists in the /upgrade_filter. asp file where the 'path' argument can be manipulated to execute arbitrary commands remotely without authentication or user interaction. Although the CVSS score is 5. 3, exploitation requires low privileges but no user interaction, and the vulnerability impacts confidentiality, integrity, and availability. No public exploits are currently known in the wild, but the exploit code has been made public, increasing the risk of exploitation. European organizations using this D-Link model, especially in countries with high D-Link market penetration, could face risks of device compromise, network disruption, or lateral movement. Mitigations include immediate firmware updates when available, network segmentation, restricting access to management interfaces, and monitoring for suspicious activity related to upgrade_filter.

AI-Powered Analysis

AILast updated: 01/16/2026, 10:09:15 UTC

Technical Analysis

CVE-2026-0732 is a command injection vulnerability identified in the D-Link DI-8200G router firmware version 17.12.20A1. The vulnerability resides in an unspecified function within the /upgrade_filter.asp file, where the 'path' parameter can be manipulated by an attacker to inject and execute arbitrary system commands. This flaw allows remote attackers to execute commands on the device without requiring authentication or user interaction, significantly increasing the attack surface. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The impact affects confidentiality, integrity, and availability at a low level, suggesting partial control or disruption of the device. Although no exploits are currently observed in the wild, the public availability of exploit code raises the risk of exploitation by threat actors. The D-Link DI-8200G is a widely deployed router model, often used in small to medium enterprise and residential environments, making this vulnerability relevant for network security. The lack of an official patch or mitigation guidance in the provided data emphasizes the need for proactive defensive measures.

Potential Impact

European organizations using the D-Link DI-8200G router with the vulnerable firmware version face risks including unauthorized command execution, which can lead to device compromise, network disruption, data interception, or lateral movement within internal networks. This can affect confidentiality by exposing sensitive network configurations or data, integrity by allowing attackers to alter device settings or firmware, and availability by causing denial of service or network outages. Given the remote exploitability without authentication or user interaction, attackers can potentially compromise devices from outside the network perimeter. This is particularly concerning for critical infrastructure, SMEs, and enterprises relying on these routers for secure connectivity. The medium severity rating suggests that while the impact is significant, exploitation may be limited by the requirement of low privileges and the specific firmware version. However, the public availability of exploit code increases the likelihood of opportunistic attacks, especially in environments with weak network segmentation or exposed management interfaces.

Mitigation Recommendations

1. Immediately check for and apply any official firmware updates from D-Link addressing CVE-2026-0732. 2. If no patch is available, restrict access to the router's management interfaces by limiting IP ranges and disabling remote management where possible. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Monitor network traffic for unusual requests targeting /upgrade_filter.asp or anomalous command execution patterns. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this vulnerability. 6. Conduct regular audits of device configurations and logs to identify unauthorized changes. 7. Educate network administrators about the risks and signs of exploitation related to this vulnerability. 8. Consider replacing outdated or unsupported devices if patches are unavailable or delayed. 9. Use strong authentication and encryption for device management to reduce risk of unauthorized access. 10. Maintain an incident response plan to quickly isolate and remediate compromised devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-08T15:25:51.430Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696040afecefc3cd7c7366f9

Added to database: 1/8/2026, 11:41:35 PM

Last enriched: 1/16/2026, 10:09:15 AM

Last updated: 2/7/2026, 6:21:44 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats